Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00462
HistoryFeb 09, 2021 - 12:00 a.m.

Intel® Ethernet E810 Adapter Driver Advisory

2021-02-0900:00:00
Intel Security Center
www.intel.com
67

Summary:

Potential security vulnerabilities in some Intel® Ethernet E810 Adapter Drivers for Linux and Windows* may allow denial of service or information disclosure.** **Intel is releasing driver updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2020-24504

Description: Uncontrolled resource consumption in some Intel® Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable denial of service via local access.

CVSS Base Score: 6.5 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVEID: CVE-2020-24502

Description: Improper input validation in some Intel® Ethernet E810 Adapter drivers for Linux before version 1.0.4 and before version 1.4.29.0 for Windows*, may allow an authenticated user to potentially enable a denial of service via local access.

CVSS Base Score: 3.8 Low

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L

CVEID: CVE-2020-24503

Description: Insufficient access control in some Intel® Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable information disclosure via local access.

CVSS Base Score: 3.3 Low

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Affected Products:

Intel® Ethernet E810 Adapter drivers for Linux before version 1.0.4.

Intel® Ethernet E810 Adapter drivers for Windows* before version 1.4.29.0.

Recommendations:

Intel recommends updating the Intel® Ethernet E810 Adapter drivers for Linux to version 1.0.4 or later and version 1.4.29.0 or later for Windows*.

Updates are available for download at this location:

<https://downloadcenter.intel.com/product/184846/Intel-Ethernet-Network-Adapter-E810-Series&gt;

Acknowledgements:

These issues were found internally by Intel employees.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.